ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.04633
  4. Cited By
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks
  by Backdooring

Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring

13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
ArXivPDFHTML

Papers citing "Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"

50 / 145 papers shown
Title
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
Reda Bellafqira
Gouenou Coatrieux
24
5
0
27 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep
  Neural Networks
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
Ran He
AAML
MLAU
52
29
0
21 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural
  Networks
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
32
16
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based
  on Intrinsic Features
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
27
2
0
14 Oct 2022
An Embarrassingly Simple Approach for Intellectual Property Rights
  Protection on Recurrent Neural Networks
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Zhi Qin Tan
H. P. Wong
Chee Seng Chan
28
1
0
03 Oct 2022
Generative Model Watermarking Based on Human Visual System
Generative Model Watermarking Based on Human Visual System
Li Zhang
Yong-Jin Liu
Shaoteng Liu
Tianshu Yang
Yexin Wang
Xinpeng Zhang
Han-Yan Wu
29
4
0
30 Sep 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
25
2
0
29 Sep 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset
  Copyright Protection
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
56
98
0
27 Sep 2022
Solving the Capsulation Attack against Backdoor-based Deep Neural
  Network Watermarks by Reversing Triggers
Solving the Capsulation Attack against Backdoor-based Deep Neural Network Watermarks by Reversing Triggers
Fangqi Li
Shilin Wang
Yun Zhu
AAML
18
1
0
30 Aug 2022
An Access Control Method with Secret Key for Semantic Segmentation
  Models
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
24
0
0
28 Aug 2022
Customized Watermarking for Deep Neural Networks via Label Distribution
  Perturbation
Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Tzu-Yun Chien
Chih-Ya Shen
AAML
23
0
0
10 Aug 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive
  Learning
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
27
4
0
08 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
46
12
0
04 Aug 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
36
21
0
12 Jul 2022
ROSE: A RObust and SEcure DNN Watermarking
ROSE: A RObust and SEcure DNN Watermarking
Kassem Kallas
Teddy Furon
11
7
0
22 Jun 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
59
5
0
30 May 2022
Verifying Integrity of Deep Ensemble Models by Lossless Black-box
  Watermarking with Sensitive Samples
Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive Samples
Lina Lin
Hanzhou Wu
AAML
19
5
0
09 May 2022
Stealing and Evading Malware Classifiers and Antivirus at Low False
  Positive Conditions
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions
M. Rigaki
Sebastian Garcia
AAML
25
10
0
13 Apr 2022
Knowledge-Free Black-Box Watermark and Ownership Proof for Image
  Classification Neural Networks
Knowledge-Free Black-Box Watermark and Ownership Proof for Image Classification Neural Networks
Fangqi Li
Shilin Wang
16
1
0
09 Apr 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
33
66
0
17 Feb 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained
  Encoders
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong
Xinlei He
Yang Zhang
23
53
0
27 Jan 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
30
58
0
26 Jan 2022
FedComm: Federated Learning as a Medium for Covert Communication
FedComm: Federated Learning as a Medium for Covert Communication
Dorjan Hitaj
Giulio Pagnotta
Briland Hitaj
Fernando Perez-Cruz
L. Mancini
FedML
32
10
0
21 Jan 2022
Watermarking Pre-trained Encoders in Contrastive Learning
Watermarking Pre-trained Encoders in Contrastive Learning
Yutong Wu
Han Qiu
Tianwei Zhang
L. Jiwei
M. Qiu
33
11
0
20 Jan 2022
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
Xudong Pan
Yifan Yan
Mi Zhang
Min Yang
27
23
0
19 Jan 2022
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning
Yupei Liu
Jinyuan Jia
Hongbin Liu
Neil Zhenqiang Gong
MIACV
16
24
0
15 Jan 2022
Defending against Model Stealing via Verifying Embedded External
  Features
Defending against Model Stealing via Verifying Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yong Jiang
Shutao Xia
Xiaochun Cao
AAML
43
61
0
07 Dec 2021
Protecting Intellectual Property of Language Generation APIs with
  Lexical Watermark
Protecting Intellectual Property of Language Generation APIs with Lexical Watermark
Xuanli He
Qiongkai Xu
Lingjuan Lyu
Fangzhao Wu
Chenguang Wang
WaLM
180
95
0
05 Dec 2021
Safe Distillation Box
Safe Distillation Box
Jingwen Ye
Yining Mao
Mingli Song
Xinchao Wang
Cheng Jin
Xiuming Zhang
AAML
24
13
0
05 Dec 2021
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for
  Machine Learning
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Vasisht Duddu
S. Szyller
Nadarajah Asokan
32
12
0
04 Dec 2021
Sound and Complete Neural Network Repair with Minimality and Locality
  Guarantees
Sound and Complete Neural Network Repair with Minimality and Locality Guarantees
Feisi Fu
Wenchao Li
KELM
AAML
41
26
0
14 Oct 2021
Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Tian Dong
Han Qiu
Tianwei Zhang
Jiwei Li
Hewu Li
Jialiang Lu
AAML
39
8
0
07 Oct 2021
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep
  Learning
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning
Ren Wang
Zhe Xu
Alfred Hero
32
0
0
06 Oct 2021
SoK: Machine Learning Governance
SoK: Machine Learning Governance
Varun Chandrasekaran
Hengrui Jia
Anvith Thudi
Adelin Travers
Mohammad Yaghini
Nicolas Papernot
43
16
0
20 Sep 2021
Protect the Intellectual Property of Dataset against Unauthorized Use
Protect the Intellectual Property of Dataset against Unauthorized Use
Mingfu Xue
Yinghao Wu
Yushu Zhang
Jian Wang
Weiqiang Liu
38
4
0
16 Sep 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
26
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
16
5
0
01 Sep 2021
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks
Anuj Dubey
Rosario Cammarota
Vikram B. Suresh
Aydin Aysu
AAML
33
31
0
01 Sep 2021
Quantization Backdoors to Deep Learning Commercial Frameworks
Quantization Backdoors to Deep Learning Commercial Frameworks
Hua Ma
Huming Qiu
Yansong Gao
Zhi-Li Zhang
A. Abuadbba
Minhui Xue
Anmin Fu
Jiliang Zhang
S. Al-Sarawi
Derek Abbott
MQ
38
19
0
20 Aug 2021
Regulating Ownership Verification for Deep Neural Networks: Scenarios,
  Protocols, and Prospects
Regulating Ownership Verification for Deep Neural Networks: Scenarios, Protocols, and Prospects
Fangqi Li
Shi-Lin Wang
Alan Wee-Chung Liew
24
8
0
20 Aug 2021
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine
  learning-based genomic analysis
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Esha Sarkar
Michail Maniatakos
34
3
0
14 Aug 2021
SoK: How Robust is Image Classification Deep Neural Network
  Watermarking? (Extended Version)
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)
Nils Lukas
Edward Jiang
Xinda Li
Florian Kerschbaum
AAML
36
87
0
11 Aug 2021
Exploring Structure Consistency for Deep Model Watermarking
Exploring Structure Consistency for Deep Model Watermarking
Jie Zhang
Dongdong Chen
Jing Liao
Han Fang
Zehua Ma
Weiming Zhang
G. Hua
Nenghai Yu
AAML
24
4
0
05 Aug 2021
Structural Watermarking to Deep Neural Networks via Network Channel
  Pruning
Structural Watermarking to Deep Neural Networks via Network Channel Pruning
Xiangyu Zhao
Yinzhe Yao
Hanzhou Wu
Xinpeng Zhang
AAML
21
23
0
19 Jul 2021
HODA: Hardness-Oriented Detection of Model Extraction Attacks
HODA: Hardness-Oriented Detection of Model Extraction Attacks
A. M. Sadeghzadeh
Amir Mohammad Sobhanian
F. Dehghan
R. Jalili
MIACV
25
7
0
21 Jun 2021
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in
  Deep Neural Networks
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Suyoung Lee
Wonho Song
Suman Jana
M. Cha
Sooel Son
AAML
27
13
0
18 Jun 2021
Detect and remove watermark in deep neural networks via generative
  adversarial networks
Detect and remove watermark in deep neural networks via generative adversarial networks
Haoqi Wang
Mingfu Xue
Shichang Sun
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
29
12
0
15 Jun 2021
Non-Transferable Learning: A New Approach for Model Ownership
  Verification and Applicability Authorization
Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
Lixu Wang
Shichao Xu
Ruiqi Xu
Tianlin Li
Qi Zhu
AAML
19
45
0
13 Jun 2021
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse
  Detection
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Yan Liang
Ziqi Zhang
Bingyan Liu
Ziyue Yang
Yunxin Liu
19
53
0
11 Jun 2021
Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word
  Substitution
Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution
Fanchao Qi
Yuan Yao
Sophia Xu
Zhiyuan Liu
Maosong Sun
SILM
33
126
0
11 Jun 2021
Previous
123
Next